Time-release Protocol from Bitcoin and Witness Encryption for SAT
@inproceedings{Liu2015TimereleasePF, title={Time-release Protocol from Bitcoin and Witness Encryption for SAT}, author={Jia Liu}, year={2015} }
We propose a new time-release protocol based on the bitcoin protocol and witness encryption. We derive a “public key” from the bitcoin block chain for encryption. The decryption key are the unpredictable information in the future blocks (e.g., transactions, nonces) that will be computed by the bitcoin network. We build this protocol by witness encryption and encrypt with the bitcoin proof-of-work constraints. The novelty of our protocol is that the decryption key will be automatically and…
16 Citations
TIDE: A novel approach to constructing timed-release encryption
- Computer Science, Mathematics
- 2022
TIDE (TIme Delayed Encryption), a novel approach to constructing timed-release encryption based upon the RSA cryptosystem, where instead of directly encrypting the secret key to the future, the solver is utilised to factor the RSA modulus, and hence derive the decryption key.
How to build time-lock encryption
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2015
A new construction of a witness encryption scheme, based on Subset-Sum, achieves extractable security without relying on obfuscation and is independent of the implementations of multilinear maps.
Practical Time-Release Blockchain
- Computer Science, MathematicsElectronics
- 2020
This paper proposes a new, practical time-release blockchain, and finds the key to decrypt the content after a certain time, and implements a prototype version of the blockchain system using Python.
Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model
- Computer Science, MathematicsSecur. Commun. Networks
- 2021
A concrete scheme and a generic scheme of security-enhanced TRE (SETRE) in the random oracle model are proposed and formalized, giving a provably secure concrete construction of SETRE.
Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2019
This work puts forth the first formal treatment of timestamping cryptographic primitives in the UC framework with respect to a global clock, and proposes timed versions of primitives commonly used for authenticating information, such as digital signatures, non-interactive zero-knowledge proofs, and signatures of knowledge.
Encrypting Into the Future Exploring Time-Lock Encryption Bachelor Thesis
- Computer Science
- 2021
An overview over TLE is provided based on three selected constructions based on adequate criteria to provide an overview over the strengths and limitations.
Time-Lock Puzzles from Randomized Encodings
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2015
It is shown that various flavors of randomized encodings give rise to time-lock puzzles of varying strengths, whose security can be shown assuming the mere existence of non-parallelizing languages, which are languages that require circuits of depth at least t to decide, in the worst-case.
Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I
- Computer Science, MathematicsACNS
- 2020
This work introduces new bivariate-polynomials-based sharing techniques allowing to batch up to n − 2 secrets in Proactive Secret Sharing, and tackles the efficiency bottleneck and construct a PSS protocol with O(n/ ) communication complexity for secrets, i.e., an amortized communication complexity of O( n) when the maximum batch size is used.
SilentDelivery: Practical Timed-delivery of Private Information using Smart Contracts
- Computer ScienceArXiv
- 2019
SilentDelivery is a secure, scalable and cost-efficient protocol for implementing timed-delivery of private information in a decentralized blockchain network and reduces the cost of running smart contracts by 85%.
Keeping Time-Release Secrets through Smart Contracts
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2018
The main idea is to encourage public vigilantism by incorporating an informer-bounty mechanism that pays bounty to any informer who can provide evidence of the leakage and be of independent interest to other applications of threshold secret sharing in deterring sharing.
References
SHOWING 1-10 OF 29 REFERENCES
Witness encryption and its applications
- Computer Science, MathematicsSTOC '13
- 2013
The method for witness encryption is introduced and formally defined, which yields the first candidate construction for an open problem posed by Rudich in 1989: constructing computational secret sharing schemes for an NP-complete access structure.
Time-Specific Encryption
- Computer Science, MathematicsSCN
- 2010
This paper extends Plain TSE to the public-key and identity-based settings, where receivers are additionally equipped with private keys and either public keys or identities, and where decryption now requires the use of the private key as well as an appropriate TIK.
Witness Encryption from Instance Independent Assumptions
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2014
A candidate for a witness encryption scheme built using multilinear encodings was provided, but one significant limitation of the work is that the candidate had no proof of security (other than essentially assuming the scheme secure).
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
- Computer Science, Mathematics2013 IEEE 54th Annual Symposium on Foundations of Computer Science
- 2013
This work gives constructions for indistinguishability obfuscation and functional encryption that supports all polynomial-size circuits and shows how to use them together with Fully Homomorphic Encryption to achieve functional encryption for all circuits.
Conditional Oblivious Transfer and Timed-Release Encryption
- Computer Science, MathematicsEUROCRYPT
- 1999
An efficient and secure timed-release encryption scheme using a "time server" which inputs the current time into the system and is based on a novel cryptographic primitive: a variant of oblivious transfer which is called conditional oblivious transfer.
Cryptanalysis of GGH Map
- Computer Science, MathematicsEUROCRYPT
- 2016
This paper presents several efficient attacks on GGH map, aiming at multipartite key exchange MKE and the instance of witness encryption THE AUTHORS based on the hardness of exact-3-cover X3C problem, and presents cryptanalysis of two simple revisions of GGHMap, which shows that MKE can be broken under the assumption that $$2^{K}$$2K is polynomially large.
Bitcoin: A Peer-to-Peer Electronic Cash System
- Computer Science
- 2008
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.
Efficient and Non-interactive Timed-Release Encryption
- Computer ScienceICICS
- 2005
This paper revisits the important problem of sending a message “into the future” in such a way that no communication is needed between the server and other entities and introduces a new stringent model tailored to the non-interactive setting.
Time-lock Puzzles and Timed-release Crypto
- Computer Science
- 1996
There are two natural approaches to implementing timed-release crypto: Use ``time-lock puzzles''--computational problems that can not be solved without running a computer continuously for at least a certain amount of time, and use trusted agents who promise not to reveal certain information until a specified date.
Verifiable partial key escrow
- Computer ScienceCCS '97
- 1997
This work provides schemes to perform partial key escrow in a verifiable manner in a public-key encryption setting and shows that other proposals for verifiable partial key Escrow suffer from the early recovery problem, and thus do not in fact offer an advantage over standard key-escrow schemes.